1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
3 years ago
15

You’ve received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before ex

tracting them. Which of the following commands would you use to do this?
A. tar uvf data79.tar
B. tar cvf data79.tar
C. tar xvf data79.tar
D. tar rvf data79.tar
E. tar tvf data79.tar
Computers and Technology
1 answer:
Nina [5.8K]3 years ago
4 0

Answer:

D. tar rvf data79.tar

You might be interested in
6. Larger Than n In a program, write a function that accepts two arguments: a list, and a number n. Assume that the list contain
Reika [66]

Answer:

The solution code is written in Python

  1. def largerThanN(myList, n):
  2.    output = ""
  3.    for x in myList:
  4.        if(x > n):
  5.            output += str(x) + " "
  6.    
  7.    print(output)
  8. l = [5, 12, 11, 4, 56, 32]
  9. n = 15
  10. largerThanN(l, n)

Explanation:

Firstly, create a function largerThanN that accepts two arguments, a list (myList) and a number (n) (Line 1).

Next, create a output variable to hold the string of numbers in the list that are greater than the input number n (Line 2).

Create a for loop to traverse through each number in the list and then check if the current x is bigger than n. If so concatenate the x to output string along with a single space " " (Line 4 -6)

After the loop, print the output string (Line 8)

We test the function by using a sample list and n = 15 (Line 10 - 12). The program will display 56 32 .

6 0
3 years ago
Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What
LiRa [457]

Answer:

Options Include:

<em>A) Server-side validation </em>

<em>B) Client-side validation </em>

<em>C) Validate in trust </em>

D) Client-side and server-side validation

<em>Client-side and server-side validation is Correct</em>

Explanation:

The best option is to validate the client side with the server side. Using these together would provide the best testing option for Sharon.

<em>This keeps user feedback instantly without wasting postbacks while also protecting against JavaScript disabled users. That's how the validation controls for ASP.NET operate. </em>

This is definitely not over-engineering as there are risks of using one without the other.

Individual validation on the server side and individual validation on the client side are both incorrect. Trust validation is not a form of validation.

4 0
3 years ago
What do you think about the argument that word processing reduces the quality of writing?
slava [35]
<span>I believe when you're given a sufficient amount of time you are able to write your thoughts clearly than when you're given a short period of time to answer questions or make an argument on an essay BUT there is a drawback with the tools within the word processing. Word processing comes with a spell check but it does not correct homonyms such as they're, their and there or other homonyms. My experience with word processing is that I always need time to effectively write something and that helps me make less grammatical mistakes when I take my time to write and edit my paper, I guess it all depends on the individual in their writing skills

I hope this helps!
</span>
5 0
4 years ago
I don't have a split screen in my Samsung Galaxy A02 why???​
weqwewe [10]

Answer:

YOU CAN open

Turn on Multi Window

1. Select the Recent apps key. 2. Select the desired app icon, then select Open in split screen view.

Explanation:

PLEASE MARK ME BRAINLIEST IF MY ANSWER IS CORRECT

6 0
2 years ago
The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platf
olasank [31]

Answer:

Unix

Explanation:

UNIX is simply an operating system developed by Bell Laboratories in the 1960s. Ever since then, it has been constantly worked upon and developed. It is an operating system because it is a suite of programs capable of making a computer to function. Unix is considered to be a stable, multi-user, and multi-tasking system for both desktops and laptops and even servers.

8 0
3 years ago
Other questions:
  • _____ software is used to play, create, and modify audio and video files.
    6·1 answer
  • Submit your 300-word essay describing the equipment usedI in a well-equipped studio’s audio department and the training and expe
    8·2 answers
  • How are devices connected to each other via Bluetooth? Choose two answers.
    11·1 answer
  • Manny has created more than one hundred bookmarks. When he looks at the menu, he has to scroll through a very long list of bookm
    15·1 answer
  • What are the three types of network topologies used today?
    13·1 answer
  • Mrs. Johnson is here today to receive an intercostal nerve block to mitigate the debilitating pain of her malignancy. Her cancer
    13·1 answer
  • 3. Which of the following is called address operator?<br> a)*<br> b) &amp;<br> c).<br> d) %
    12·1 answer
  • Slide layouts can be changed by _________
    6·1 answer
  • What is the term for unsolicited Email​
    15·1 answer
  • Your design company needs to create a sample animation for a client very quickly. You already have the basic graphics, and the c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!